Home > Cisco > Router > Cisco Router 800 Series Software Configuration Guide

Cisco Router 800 Series Software Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 800 Series Software Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 600
    							 
    8-35
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    Chapter 8      Advanced Router Configuration
    Configuring International Phone Support
    Configuring Caller ID Alerting
    Specify the caller ID alerting method and enable caller ID support by using the 
    caller-id alerting voice-port configuration command. The no form of this 
    command sets the caller ID alerting type to caller ID alerting ring type 1.
    caller-id alerting { line-reversal | pre-ring | ring < 1 | 2 > }
    no caller-id alerting { line-reversal | pre-ring | ring < 1 | 2 > }
    Alerting methods are described in the following table.
    The default alerting method is ring 1. If the country in which the router is 
    installed uses a different alerting method, the appropriate alerting method must be 
    configured. The caller-id alerting ring command can be used in countries using 
    the BellCore/Telcordia standard. The caller-id alerting line-reversal, the 
    caller-id alerting pre-ring, and caller-id alerting ring commands can be used in 
    countries that do not use the BellCore/Telcordia standard.
    The caller-id alerting command automatically enables caller ID support for the 
    specific voice port.Alerting Method Description
    line-reversalUse line-reversal alerting method. 
    pre-ringSet a 250-millisecond pre-ring alerting method for caller ID 
    information for on-hook (Type 1) caller ID at an FXS voice 
    port. 
    ring < 1 | 2 >Set the ring-cycle method for receiving caller ID 
    information for on-hook (Type 1) caller ID at an FXS voice 
    port. 
    If your telephone service provider specifies it, use this 
    setting to provide caller ID alerting (display) after the 
    first ring at the receiving station. 
    If your telephone service provider specifies it, use this 
    setting to provide caller ID alerting (display) after the 
    second ring. 
    						
    							 
    Chapter 8      Advanced Router Configuration
    Configuring Committed Access Rate
    8-36
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    Configuring Caller ID Display Blocking
    To request the blocking of the display of caller ID information at the far end of a 
    call for calls originated at an FXS port, use the caller-id block voice-port 
    configuration command at the originating Foreign FXS voice port. To allow the 
    display of caller ID information, use the no form of this command.
    caller-id block
    no caller-id block
    The default is no blocking of caller ID information.
    NoteThe calling party information is included in the routed on-net call, as this 
    information is often required for other purposes, such as billing and call 
    blocking. The request to block display of the calling party information on 
    terminating FXS ports is normally accepted by Cisco routers, but no guarantee 
    can be made regarding the acceptance of the request by other equipment.
    Configuring Committed Access Rate
    This feature is available on the following Cisco routers:
    Cisco 806
    Cisco 826 and 836
    Cisco 827, 827H, 827-4V, 831, and 837
    Cisco 828
    Use the committed access rate (CAR) to limit bandwidth transmission rates to 
    traffic sources and destinations and to specify policies for handling traffic that 
    breaches the specified bandwidth allocations. To enable CAR, enter the 
    rate-limit command while in ATM interface configuration mode.
    Configuration Example
    The following example shows a CAR configuration:
    interface ATM0.1 point-to-point
     mtu 576 
    						
    							 
    8-37
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    Chapter 8      Advanced Router Configuration
    Configuring VPN IPSec Support Through NAT
     ip address 10.0.0.10 255.255.255.0
     rate-limit output 368000 2000 2000 conform-action set-dscp-transmit 
    40 exceed-action set-dscp-transmit 48
     pvc 0/33 
      protocol ip 10.0.0.9 broadcast
      vbr-nrt 142 142 1
      encapsulation aal5snap
     !
    Configuring VPN IPSec Support Through NAT
    This feature is available on the following Cisco routers:
    Cisco 806 
    Cisco 826 and 836
    Cisco 827, 827H, 827-4V, 831, and 837
    Cisco SOHO 77, SOHO 78, SOHO 96, and SOHO 97 
    Cisco 828 
    This feature includes client software that does not use Transmission Control 
    Protocol (TCP) wrapping or User Datagram Protocol (UDP) wrapping. On Cisco 
    routers, this feature allows the simultaneous use of multiple, PC-based IPSec 
    clients on which IPSec packet wrapping is disabled or is not supported. When PCs 
    connected to the router create an IPSec tunnel, network address translation (NAT) 
    on the router translates the private IP addresses in these packets to public IP 
    addresses. This NAT feature also supports multiple Point-to-Point Tunnel 
    Protocol (PPTP) sessions, which may be initiated by PCs with PPTP client 
    software.
    You must enter the following command in global configuration mode for this 
    feature to work:
    ip nat inside source list number interface BVI number overload 
    						
    							 
    Chapter 8      Advanced Router Configuration
    Configuring VPN IPSec Support Through NAT
    8-38
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    NAT Default Inside Server Enhancement
    This feature is supported on the following Cisco routers:
    Cisco 806
    Cisco 831, 836, and 837
    Cisco SOHO 91, SOHO 96, and SOHO 97
    The NAT command has been extended to allow you to specify an inside local 
    address to receive packets that do not match criteria in other NAT statements in 
    the configuration. 
    The syntax is as follows:
    ip nat inside source static inside_local interface interface_name
    Configuration Example
    The following example shows configuration of a Cisco 806 router supporting two 
    devices with the addresses 20.0.0.14, and 20.0.0.16, as shown in Figure 8-1.
    Figure 8-1 Cisco 806 Router Performing Network Address Translation for Two 
    Devices
    20.0.0.14
    20.0.0.16NAT default
    inside server 20.0.0.0 10.0.0.0Cisco 806
    65369 
    						
    							 
    8-39
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    Chapter 8      Advanced Router Configuration
    Configuring VPN IPSec Support Through NAT
    Several NAT statements direct traffic to the address 20.0.0.14. All packets not 
    matching those NAT statements will be routed to 20.0.0.16.
    Current configuration :942 bytes
    !
    version 12.2
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    !
    hostname c806-1
    !
    ip subnet-zero
    !
    ip ssh time-out 120
    ip ssh authentication-retries 3
    !
    crypto mib ipsec flowmib history tunnel size 200
    crypto mib ipsec flowmib history failure size 200
    !
    interface Ethernet0
     ip address 20.0.0.1 255.0.0.0
     ip nat inside
     hold-queue 100 out
    !
    interface Ethernet1
     ip address 10.0.0.1 255.0.0.0 
     ip nat outside
    !
    ip nat inside source static tcp 20.0.0.14 80 interface Ethernet1 80
    ip nat inside source static udp 20.0.0.14 161 interface Ethernet1 161
    !
    ip nat inside source static 20.0.0.16 interface Ethernet1
    ! 20.0.0.16 is defined as the catch-all address
    !
    ip nat inside source static udp 20.0.0.14 1000 interface Ethernet1 
    1000
    ! udp port 1000 traffic will be routed to 20.0.0.14
    !
    ip nat inside source static tcp 20.0.0.14 23 interface Ethernet1 23
    ! telnet traffic will be routed to 20.0.0.14
    !
    ip classless
    no ip http server
    !
    !
    line con 0 
    						
    							 
    Chapter 8      Advanced Router Configuration
    Configuring VoAAL2 ATM Forum Profile 9 Support
    8-40
    Cisco 800 Series Software Configuration Guide
    78-5372-06  stopbits 1
    line vty 0 4
     password lab
     login
    !
    Configuring VoAAL2 ATM Forum Profile 9 Support
    The Cisco 827-4V router supports voice over ATM Adaptation Layer 2 
    (VoAAL2) ATM Forum Profile 9. ATM Forum Profile 9 supports a 44-byte 
    payload, optimizing voice transport efficiency, and makes interoperability with 
    Tdsoft gateways possible.
    This feature enables the Cisco router to interoperate with GR.303 and V5.2 
    gateways that communicate with Class 5 switches. The voice PVC is routed to a 
    VoAAL2 gateway that supports either the General Recommendation 303 
    (GR.303) or the V5.2 protocol. This gateway converts the AAL2-encoded voice 
    cells to a format that can be sent over a time-division multiplexed connection to 
    a Class 5 switch. The data PVC can be routed through the digital subscriber line 
    access multiplexer (DSLAM) or aggregator to the data network.
    Configuring ATM Forum Profile 9
    Follow the steps below to configure ATM Forum Profile 9 support for a voice 
    port, beginning in global configuration mode.
    Command Task
    Step 1voice class permanent 1Configure a voice class.
    Step 2signal timing oos timeout disabledDisable the assertion of the receive 
    out-of-service (oos) pattern to the PBX when 
    signaling packets are lost. 
    Step 3exitExit voice class configuration mode.
    Step 4voice service voatmEnter voice service configuration mode.
    Step 5session protocol aal2Enter voice-service session configuration 
    mode, and specify AAL2 trunking. 
    						
    							 
    8-41
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    Chapter 8      Advanced Router Configuration
    Configuring VoAAL2 ATM Forum Profile 9 Support
    Step 6mode blesIndicate that VOATM is to be used in 
    broadband loop emulation service (BLES) 
    mode.
    Step 7exitEnter the exit command to leave session 
    protocol mode. Enter exit again to leave voice 
    service configuration mode.
    Step 8interface atm0Enter ATM 0 interface configuration mode.
    Step 9pvc vpi vciSpecify the virtual path identifier (VPI) and 
    the virtual channel identifier (VCI) of the 
    PVC.
    Step 10vbr-rt pcr acr bcsSpecify the variable bit rate-real time peak 
    cell rate and average cell rate in kbps, and the 
    burst cell size in number of cells.
    Step 11encapsulation aal2Specify ATM adaptation layer 2 (AAL2) type 
    encapsulation.
    Step 12no atm cell-clumping-disableEnsure that sufficient bandwidth is allocated 
    for data packets when voice calls are in 
    progress.
    Step 13exitExit ATM 0 interface configuration mode.
    Step 14dial-peer voice tag voatmPlace the router in dial-peer voice 
    configuration mode.
    Step 15session protocol aal2-trunkConfigure the session protocol to support 
    AAL2-trunk permanent (private line) trunk 
    calls.
    Step 16session target atm0 pvc vpi/vci cid cidThis command has three parameters: vpi 
    (virtual path identifier), vci (virtual channel 
    identifier), and cid (AAL2 channel identifier). 
    Step 17codec aal2 profileEnter codec aal2-profile atmf 9 g711alaw to 
    specify that only G.711 a-law is used for 
    voice dial peer. Enter codec aal2-profile 
    atmf 9 g711ulaw to specify that only G.711 
    mu-law is used for voice dial peer. Command Task 
    						
    							 
    Chapter 8      Advanced Router Configuration
    Configuring VoAAL2 ATM Forum Profile 9 Support
    8-42
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    NoteOne phone line requires a minimum setting of 78 kbps for both peak cell rate 
    (PCR) and allowed cell rate (ACR) values. 
    Configuration Example
    The following example shows the configuration for two voice ports using 
    Profile 9, and the G.711 a-law codec. VBR-RT, PCR, and ACR values are 312 to 
    accommodate four phone lines, although only two phone lines are currently 
    configured.
    voice service voatm
     !
     session protocol aal2
      mode bles
    !
    !
    voice class permanent 1
     signal timing oos timeout disabled
    Step 18destination-pattern destination stringAssociate a dial-peer with a voice port. The 
    destination string is the phone number in 
    E.164 format that must match the destination 
    string configured for the voice-port. 
    Step 19voice-class permanent 1Associate this dial peer with the configured 
    voice class.
    Step 20no vadSpecify no voice activity detection (VAD).
    Step 21exitExit dial peer voice configuration mode.
    Step 22voice port #Enter voice port configuration mode.
    Step 23connection trunk destination-patternSpecify the dialer string. The destination 
    pattern must match the destination-string 
    configured for the dial peer. 
    Step 24playout-delay mode fixed no-timestampsPlay out the AAL2 packet at a fixed rate, and 
    ignore the time stamps carried in the packet.
    Step 25endExit router configuration mode. Command Task 
    						
    							 
    8-43
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    Chapter 8      Advanced Router Configuration
    Configuring VoAAL2 ATM Forum Profile 9 Support
    !
    interface atm 0
     no atm cell-clumping-disable
     pvc 1/100
     vbr-rt 312 312 32
     encapsulation aal2
    !
    voice-port 1
     playout-delay mode fixed no-timestamps
     cptone DK
     timeouts wait-release 3
     connection trunk 8881052
     caller-id enable
     !
    voice-port 2
     playout-delay mode fixed no-timestamps
     cptone DK
     timeouts wait-release 3
     connection trunk 8881053
     caller-id enable
    !
    !dial-peer voice 1000 voatm
     destination-pattern 8881052
     voice-class permanent 1
     session protocol aal2-trunk
     session target ATM0 pvc 1/100 16
     codec aal2-profile ATMF 9 g711alaw
     no vad
    !
    dial-peer voice 1001 voatm
     destination-pattern 8881053
     voice-class permanent 1
     session protocol aal2-trunk
     session target ATM0 pvc 1/100 17
     codec aal2-profile ATMF 9 g711alaw
     no vad
    ! 
    						
    							 
    Chapter 8      Advanced Router Configuration
    Configuring ATM OAM F5 Continuity Check Support
    8-44
    Cisco 800 Series Software Configuration Guide
    78-5372-06
    Configuring ATM OAM F5 Continuity Check Support
    This feature is available on the following Cisco routers:
    Cisco 826 and 836
    Cisco 827, 827H, and 837
    Cisco SOHO 77, SOHO 96, and SOHO 97
    ATM Operation, Administration, and Maintenance (OAM) F5 continuity check 
    (CC) cells enable network administrators to detect misconfigurations in the ATM 
    layer. Such misconfigurations can cause misdelivery of a cell stream to a third 
    party or can cause unintended merging of cells from multiple sources.
    CC cells provide an in-service tool optimized to detect connectivity problems at 
    the ATM layer. CC cells are sent between a router designated as the source 
    location and a router designated as the sink location. The local router can be 
    configured as the source, as the sink, or as both the source and the sink. It is not 
    necessary to enter a CC configuration on the router at the other end of the 
    segment, because the router on which CC has been configured sends a CC 
    activation request to the router at the other end of the segment, directing it to act 
    as either a source or a sink.
    Configuring Continuity Checking on a PVC
    Use the following command to configure continuity checking on a PVC. 
    oam-pvc manage cc segment direction [ source | sink | both ]
    Use the no form of this command to disable continuity checking on the segment.
    no oam-pvc manage cc segment direction [ source | sink | both ]
    Configuration Example
    The following configuration example activates CC over the segment and causes 
    the router to function as the source.
    interface ATM0
     ip address 10.0.0.3 255.255.255.0
     pvc 0/33  
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Router 800 Series Software Configuration Guide